http://iet.metastore.ingenta.com
1887

Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems

Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Tag cloning attack is a serious threat to the radio-frequency identification (RFID) applications. Cloned tags detection is an effective security mechanism to prevent the attacks. To improve the accuracy and efficiency of detection for cloned tags, this study presents a deterministic cloned tags detection (DCTD) protocol for anonymous RFID systems to detect cloned tags, using a tree-based anti-collision algorithm to find irreconcilable collisions. This protocol, which uses the pseudonym of tags in the detecting process, can quickly detect all the cloned tags with a deterministic time without revealing the sensitive information. Experiments show that DCTD protocol, with less detection time and higher accuracy, outperforms the known detection protocols.

References

    1. 1)
      • B. Alomair , L. Lazos , R. Poovendran .
        1. Alomair, B., Lazos, L., Poovendran, R.: ‘Securing low-cost RFID systems: an unconditionally secure approach’, J. Comput. Secur., 2011, 19, (2), pp. 229257.
        . J. Comput. Secur. , 2 , 229 - 257
    2. 2)
    3. 3)
    4. 4)
      • M. Burmester , J. Munilla .
        4. Burmester, M., Munilla, J.: ‘Lightweight RFID authentication with forward and backward security’, ACM Trans. Inf. Syst. Sec. (TISSEC), 2011, 14, (1), p. 11.
        . ACM Trans. Inf. Syst. Sec. (TISSEC) , 1 , 11
    5. 5)
      • J. Abawajy .
        5. Abawajy, J.: ‘Enhancing RFID tag resistance against cloning attack’. Proc. of Third IEEE Int. Conf. on Network and System Security, Queensland, Australia, October 2009, pp. 1823.
        . Proc. of Third IEEE Int. Conf. on Network and System Security , 18 - 23
    6. 6)
      • M. Lehtonen , D. Ostojic , A. Ilic .
        6. Lehtonen, M., Ostojic, D., Ilic, A., et al: ‘Securing RFID systems by detecting tag cloning’. Proc. Seventh Int. Conf. on Pervasive Computing, Nara, Japan, May 2009, pp. 291308.
        . Proc. Seventh Int. Conf. on Pervasive Computing , 291 - 308
    7. 7)
      • D. Zanetti , S. Capkun , A. Juels .
        7. Zanetti, D., Capkun, S., Juels, A.: ‘Tailing RFID tags for clone detection’. Proc. Network and Distributed System Security Symposium (NDSS), San Diego, USA, February 2013, pp. 117.
        . Proc. Network and Distributed System Security Symposium (NDSS) , 1 - 17
    8. 8)
    9. 9)
    10. 10)
    11. 11)
      • C.K. Liang , Y.C. Chien , C.H. Tsai .
        11. Liang, C.K., Chien, Y.C., Tsai, C.H.: ‘A pre-detection query tree tag anti-collision scheme in RFID systems’. Proc. Seventh Int. Conf. on Sensor Technologies and Applications, Barcelona, Spain, August 2013, pp. 5156.
        . Proc. Seventh Int. Conf. on Sensor Technologies and Applications , 51 - 56
    12. 12)
    13. 13)
      • K. Finkenzeller . (2010)
        13. Finkenzeller, K.: ‘RFID handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication’ (Wiley & Sons Press, 2010, 1st edn.), pp. 194211.
        .
    14. 14)
    15. 15)
    16. 16)
    17. 17)
      • W. Zhang , Y. Guo , X. Tang .
        17. Zhang, W., Guo, Y., Tang, X., et al: ‘An efficient adaptive anticollision algorithm based on 4-ary pruning query tree’, Int. J. Distrib. Sensor Netw., 2013, 2013, pp. 17.
        . Int. J. Distrib. Sensor Netw. , 1 - 7
    18. 18)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2014.0504
Loading

Related content

content/journals/10.1049/iet-ifs.2014.0504
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address